Sciweavers

30 search results - page 5 / 6
» The Surprising Power of Epidemic Communication
Sort
View
ICT
2004
Springer
130views Communications» more  ICT 2004»
15 years 3 months ago
Rayleigh Fading Multiple Access Channel Without Channel State Information
— In this paper we determine bounds of the capacity region of a two-user multipleaccess channel with Rayleigh fading when neither the transmitters nor the receiver has channel st...
Ninoslav Marina
INFOCOM
2010
IEEE
14 years 8 months ago
Password Strength: An Empirical Analysis
—It is a well known fact that user-chosen passwords are somewhat predictable: by using tools such as dictionaries or probabilistic models, attackers and password recovery tools c...
Matteo Dell'Amico, Pietro Michiardi, Yves Roudier
SPAA
1995
ACM
15 years 1 months ago
Parallel Sorting with Limited Bandwidth
We study the problem of sorting on a parallel computer with limited communication bandwidth. By using the PRAM(m) model, where p processors communicate through a globally shared me...
Micah Adler, John W. Byers, Richard M. Karp
SUTC
2006
IEEE
15 years 3 months ago
Sensor Networks for Everyday Use: The BL-Live Experience
With 250,000 NTD invested, 6 man power allocated, and 9 month time elapsed, we present BLLive. The seemingly dumb, senseless BL Hall at National Taiwan University is transformed t...
Seng-Yong Lau, Ting-Hao Chang, Shu-Yu Hu, Hsing-Ju...
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis